HackDig : Dig high-quality web security articles for hacker

Strong Passwords Don’t Have to be Hard to Remember

Bill Burr blew it, and he knows it. The man responsible for the global password strength guidelines, which posit that you should always use alphanumeric characters and alternate uppercase and lowercase letters, recognizes his error. According to Burr, these rules “drive people crazy,” and yet, even so, do not necessarily make for good passwords. Fourteen yea
Publish At:2017-09-29 22:40 | Read:221 | Comments:0 | Tags:Security b2b passwords

Zeus is Still the Base of Many Current Trojans

In 2007, no one expected ZeuS to have such a brutal impact on the digital world. But two years later, Zbot, another of the names it is known by, became a milestone in the history of cybersecurity. With more than 3.6 million infected computers in 2009, ZeuS compromised more than 74,000 FTP accounts on such important networks as those of NASA, ABC, Oracle, Cis
Publish At:2017-09-27 15:10 | Read:188 | Comments:0 | Tags:Panda Security b2b Trojan zbot zeus

The Impact of the Blockchain on Cybersecurity

Since its appearance in 2009, the concept of the blockchain has expanded past its initial use as the base of bitcoin into many other areas. By its nature, this distributed database provides the perfect platform for the management of cryptocurrency. But its features have attracted the attention of experts interested in a broad array of other applications. Pos
Publish At:2017-09-23 00:30 | Read:394 | Comments:0 | Tags:Security b2b blockchain cybersecurity

3 Ways to Minimize “Security Fatigue” Among Employees

There’s a side effect to our rising awareness of (and concern over) cybersecurity. It’s called “security fatigue”, and employees the world over are beginning to show symptoms of it. According to a study from the National Institute of Standards and Technology (NIST), the majority of internet users suffer from this so-called security fatigue. Users find themse
Publish At:2017-09-20 17:15 | Read:428 | Comments:0 | Tags:Tips b2b security fatigue tips

Shadow IT: How to Protect Something You Didn’t Know Was There

We know that to secure a network, we need to control every single thing that happens on it. But this becomes especially difficult when there are points of the network that we don’t even know about. How can we combat an enemy that moves in the shadows? What is Shadow IT? Such blind spots fall under what is called Shadow IT, a term used to describe unapproved
Publish At:2017-09-19 04:15 | Read:230 | Comments:0 | Tags:Security b2b shadow it

Dangers Beyond Ransomware – the Risk of Spyware

There’s been a lot of talk recently about ransomware’s impact on the business environment. It would seem that the central role of this attack casts a shadow over one of the classic villains of cybersecurity: spyware. But a large percentage of today’s attacks suffered by companies today involve this malware. Its risks must not go neglected. Know your enemy On
Publish At:2017-09-15 08:00 | Read:298 | Comments:0 | Tags:Security b2b cybersecurity Spyware

Post-vacation cybersecurity tuneup: Get your company ready!

It’s that time of the year when most of us return to the stress of our jobs after having enjoyed a well-deserved summer vacation. But, if getting over the post-vacation blues is hard for anyone, for the members of the IT team it is a real nightmare: out-of-date computers, new software vulnerabilities, systems that do not work, organizational changes
Publish At:2017-09-13 19:10 | Read:305 | Comments:0 | Tags:Adaptive Defense advanced cybersecurity b2b tips

A dating site and corporate cyber-security lessons to be learned

It’s been two years since one of the most notorious cyber-attacks in history; however, the controversy surrounding Ashley Madison, the online dating service for extramarital affairs, is far from forgotten. Just to refresh your memory, Ashley Madison suffered a massive security breach in 2015 that exposed over 300 GB of user data, including users’
Publish At:2017-09-06 13:05 | Read:379 | Comments:0 | Tags:Security b2b business data breach

Back to School with Cybersecurity on our Minds

The multitude of devices that have entered our lives over the past decade have also entered the classroom, and the security issues we face every day are just as real in the school as they are in our homes or businesses. Tablets, computers, even smartwatches can be useful educational tools, but the personal data that they store, belonging to students and teac
Publish At:2017-09-01 20:50 | Read:365 | Comments:0 | Tags:Tips b2b back to school cybersecurity

The Three Primary Regulatory Changes of the GDPR

The recent increase in number and impact in cyberattacks to steal information has made it necessary to change the legislation on data protection in Europe. The GDPR (General Data Protection Regulation), which will be implemented in May 2018, aims to protect the data of European citizens and monitor how organizations process, store and use this data. Broadly
Publish At:2017-08-28 23:45 | Read:417 | Comments:0 | Tags:Security b2b businesses gdpr

Interview with Herbert Lin: “Cybersecurity is a never-ending battle”

Herbert Lin is Senior Research Scholar of Cyber Policy and Security at Stanford University’s Center for International Security and Cooperation (CISAC). Lin is also a Hank J. Holland Fellow of Cyber Policy and Security at the Hoover Institution, a prestigious research center for public policy. In addition to working in cyber policy and security, Lin has a PhD
Publish At:2017-08-25 06:35 | Read:389 | Comments:0 | Tags:Interviews b2b cybersecurity interview

The Ways Cybercrime Has Changed in 2017

With thousands of infected computers and millions of dollars lost, the latest ransomware attacks are surely marking the trends to come in the increasingly lucrative field of cybercrime. This, together with the exponential proliferation of connected devices on the IoT, as well as covert cyberwar, sets the stage for cybercrime to come. More malware, more sophi
Publish At:2017-08-21 07:30 | Read:288 | Comments:0 | Tags:Security 2017 b2b Cybercrime Ransomware

Thanks to Big Data, Threat Detection in Real Time

Endpoints have traditionally proven to be the Achilles heel of any corporate network’s security. Protecting them is vital to any security strategy. The MO of traditional antivirus solutions is to classify software using black-and-white lists. But this is not enough, as threats continue to find new ways to wriggle their way into our systems. Modern times, new
Publish At:2017-08-17 11:25 | Read:416 | Comments:0 | Tags:Security b2b big data epp

Top 10 Email Subjects for Company Phishing Attacks

George is in his office responding to his morning emails when he notices an unusual message. The subject is concise: “Security Alert”. Obviously, he wants to know what’s going on. He opens it, reads the first paragraph to see what the problem is, then clicks the link ostensibly taking him to the company page where he will have to confirm his data
Publish At:2017-08-14 09:20 | Read:362 | Comments:0 | Tags:Security b2b Phishing

Is Your Company Underestimating the Dangers of Internal Threats?

When we think of threats to our company’s cybersecurity, the first thing that comes to mind is attacks from the outside. But this line of thinking sometimes leads us to forget another crucial feature of the threat landscape: internal threats. Only about half of companies are aware of the risk of falling victim to cyberattacks due to employee negligence or ev
Publish At:2017-08-07 14:15 | Read:359 | Comments:0 | Tags:Security adaptive defense b2b internal threats

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud